General

  • Target

    BOSSARD_ORDER_4923521.zip

  • Size

    657KB

  • Sample

    240926-mydc3awfqd

  • MD5

    b3eb10d7a99084b39e0e1de2210adcb8

  • SHA1

    2d2bc41cc7980f0dc4430f8353d310e5b32efcbb

  • SHA256

    7ec499541fb4b5c295cb3c9796e6b00fecb2462daf773a8ae4745303ebb9135f

  • SHA512

    b69cc345861278b567e27c8aa800c38eee436fd728cda3d9f952a38b1e8e96e6d4e84a9ebd239598f81ef34ab8b3f517502fbedb374db8f624687f0b8f0b5b41

  • SSDEEP

    12288:yOl1e8B93VGKe3GhEcJLZ0+uECVcnYZzHm5fLVAymwIL7+dx2eVH:P1ekA3+IVcn2zGdJsHM2eVH

Malware Config

Extracted

Family

agenttesla

Credentials

Targets

    • Target

      BOSSARD_ORDER_4923521.exe

    • Size

      853KB

    • MD5

      a9ea323ea2de4868acfb99b7959b54b6

    • SHA1

      b66217db6ffda157a9252611f6b1d528f76f0420

    • SHA256

      e17765cd72f6b95c8167f428ed734688d3b545c45c23e07407361e8979b49167

    • SHA512

      eff66d932ba7d246b20fe71da264ecbabb430d27bec97bbe258f0b4ca6a43843426f5251579b444ae5fd02fbcf8d9ee8cb9030c7e7c20727bb36e813e1b3117f

    • SSDEEP

      12288:27auaN1gTyQcG+yDXEdKemm6EIJtZcIuE4VGnYZzHmPKuDVFSrdtTJHlgrdm4Vzu:27sQclMXk6OVGn2zGS6VAd

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks